Provo, Utah-based Novell Inc. and Hopkinton, Mass.-based EMC Corp unveiled last month a joint automated PC back-up solution. It brings together two storage products – Novell iFolder and EMC Automated Networked Storage – to automate the security of critical data on corporate PCs, particularly laptops that are prone to being lost or stolen, the companies said. The joint solution allows users to back up files and make those files accessible via the Internet. Novell iFolder will automatically back up critical data to EMC’s Symmetrix and CLARiiON networked storage systems, the companies said, adding that the complementary technologies are designed to prevent data loss without relying on actions by the end user. The solution is now available through existing Novell and EMC sales channels.

DSL on the move

The number of DSL (Digital Subscriber Line) subscribers worldwide grew by 5 million in the third quarter of 2002 to more than 30.6 million, according to figures released in December by market research Point Topic Ltd. in London. “We’re seeing continued strong demand for DSL lines in Asia, which shows the highest DSL penetration, but the U.S. is catching up,” said Tim Johnson, an analyst with Point Topic. Global DSL subscribers have grown steadily from 18.8 million in the fourth quarter of 2001 to 22.6 million in the first quarter of 2002 and 25.6 million in the second quarter, he said. Several major markets, including Canada, the U.K. and the U.S., have more cable modems than DSL lines, he added.

W3C gives its approval on XML

Paving the way for end-user adoption of an XML-based approach to secure XML in document form, the World Wide Web Consortium (W3C) last month offered its recommendation and stamp of approval of XML Encryption Syntax and Processing and Decryption Transform for XML Signature. When used in conjunction with XML Signature, XML Encryption and Decryption Transform could provide a starting point to secure Web services transactions and applications by permitting users to selectively sign and encrypt portions of XML data, according to a statement released by the W3C. Although it is XML Signature which is capable of determining if a document has been tampered with, the Decryption Transform specification allows the receiver of the document to know which portions of the transmission may have been inadvertently changed for encryption purposes.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now